Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
This advanced graduate textbook gives an authoritative and insightful description of the major ideas and techniques of public... [more]
This book shows the risks and protections cyberspace offers for national security and information warfare. [more]
Thorough, systematic introduction to serious cryptography, especially strong in modern forms of cipher solution used by experts.... [more]
A self-contained and widely accessible text, with almost no prior knowledge of mathematics required, this book presents a... [more]
OFFICIAL CERTIFIED ETHICAL HACKER REVIEW GUIDE: FOR VERSION 7.1 is a valuable resource to help you pursue the most recognized,... [more]
In today's super-connected computing world, your PC enjoys a richer diversity of applications, multimedia, and information... [more]
Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption... [more]
Most computer users are ignorant of the tracks, trails, and traces they leave behind when they use their computer. This book... [more]
Cyber Risks for Business Professionals: A Management Guide is a general guide to the origins of cyber risks and to developing... [more]
This book presents several novel approaches to model the interaction between the attacker and the defender and assess the... [more]
This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing... [more]
IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE... [more]
This book covers applied cryptography in computerized telecommunication networks. The authors present key technologies, algorithms,... [more]
<p>This book is a complete treatise on Quick Response (QR) Code symbols the square barcodes that can be read by smart phones.... [more]
New in the Secure Beginner's Guide series, this complete, practical resource for security and IT professionals presents the... [more]
This book systematically examines problems posed by the need for security and privacy in implantable medical devices. Coverage... [more]
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents'... [more]
This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware... [more]
Automated Security Management [more]
Cloud storage is an important service of cloud computing, which offers service for data owners to host their data in the cloud.... [more]
Security, Privacy and Trust in Cloud Systems [more]
This book offers comprehensive discussion of current wireless network security technologies, vulnerabilities and potential... [more]
Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an... [more]
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including... [more]
The only book to provide a unified view of the interplay between computational number theory and cryptography Computational... [more]